Showing 14 of 14 projects
A comprehensive collection of payloads and bypass techniques for web application security testing and penetration testing.
A comprehensive collection of payloads and bypass techniques for web application security testing and penetration testing.
A PowerShell post-exploitation framework for penetration testers, providing modules for code execution, persistence, reconnaissance, and credential theft.
Uses graph theory to map hidden attack paths in Active Directory environments for security analysis.
A PowerShell framework for offensive security, penetration testing, and red teaming with scripts for all phases.
A comprehensive, free information security reference covering techniques, tools, tactics, and resources for learning and professional development.
A simple Go-based tool to step down from root and execute a process as another user, designed for Docker containers.
A curated collection of cheat sheets and resources for penetration testing and security assessments.
A PowerShell toolkit for attacking, auditing, and securing Microsoft SQL Server environments during penetration tests.
A stealthy command and control framework that persists on webservers via a polymorphic PHP one-liner backdoor.
A Linux Kernel Module (LKM) rootkit for hiding processes, granting root privileges, and making files invisible.
A deprecated collection of PowerShell tools for offensive security operations and penetration testing.
An interactive command-line tool for exploring and exploiting the CTF protocol on Windows systems.
A tool for quickly evaluating IAM permissions and identifying security risks in AWS accounts through graph-based analysis.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.